Re: Did the US defeat wiretapping success?

2001-09-17 Thread John Denker
At 11:21 PM 9/16/01 -0400, P.J. Ponder wrote: Senator Hatch was interviewed by national media on Tuesday and stated that the US government had voice intercepts of calls talking about success with two targets. He was later criticized for talking about the intercepts. Hm, criticized? Why not

Charles Platt: The Enduring Power of Stupidity

2001-09-17 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Sun, 16 Sep 2001 20:36:04 -0400 (EDT) From: Charles Platt [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: The Enduring Power of Stupidity The Enduring Power of Stupidity During the past five days I have read many essays. To me, all of them have

Re: Which internet services were used?

2001-09-17 Thread Matt Crawford
A german TV news magazine (ZDF spezial) just mentioned that the terrorists prepared and coordinated also by using the internet, but no details were told. [Moderator: I've listened to virtually all the news conferences made so far. The FBI has yet to make any such statement. The only

Re: Which internet services were used?

2001-09-17 Thread Hadmut Danisch
On Mon, Sep 17, 2001 at 09:10:48AM -0500, Matt Crawford wrote: The only details I've heard are that the terrorists have elaborate web sites to recruit and solicit donations. Far short of operational use of the internet. They had two websites in Germany, one for recruiting people

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread David Honig
At 11:50 AM 9/17/01 +0200, Hadmut Danisch wrote: Which politician would dare to ban hotels? Which politician would fail to support mandatory registration of motel occupants with local 'authorities'? [Moderator's note: Everyone who's got a copy of Netscape or IE has cryptographic software in

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread Jim Windle
On Mon, 17 Sep 2001 11:50:13 Hadmut Danisch wrote: Depends on which kind of logic you apply. Technical logic: Yes, you're right. Policital logic: No, you're wrong. The reason is, that air planes, phones, hotels, cars, etc. are used by common people - those who elect politicians - and

Re: chip-level randomness?

2001-09-17 Thread Pawel Krawczyk
On Sat, Sep 15, 2001 at 10:16:27AM -0700, Carl Ellison wrote: I'm told that the LINUX 2.4 kernel comes with the RNG driver built-in, but I haven't tried that. It works almost out of box, kernel detects the chip and if you have the necessary device file created (character 10,183 AFAIK) you can

Re: Did the US defeat wiretapping success?

2001-09-17 Thread Matt Crawford
Senator Hatch was interviewed by national media on Tuesday and stated that the US government had voice intercepts of calls talking about success with two targets. He was later criticized for talking about the intercepts. Hm, criticized? Why not indicted? (a) Whoever knowingly

Re: Did the US defeat wiretapping success?

2001-09-17 Thread John Denker
At 01:25 PM 9/17/01 -0500, Matt Crawford wrote: Somehow I doubt that it was not a speech or debate in the senate. And what is the basis for this doubt? All evidence, including that which I quoted in my original message, indicates that he first said it in a media interview. Here is some more

No Subject

2001-09-17 Thread David Honig
At 02:14 PM 9/17/01 -0400, Jim Windle wrote: Second, if we assume for a minute that the terrorist use public key systems Given their 1. quality opsec including 2. wise avoidance of wireless phones, etc, and their 3. dependence on long-time personal contacts, isn't it more likely that private

ip: US cyberwarriors plan assault on Mideast states

2001-09-17 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Mon, 17 Sep 2001 22:32:32 -0500 To: [EMAIL PROTECTED] From: [EMAIL PROTECTED] (by way of [EMAIL PROTECTED]) Subject: ip: US cyberwarriors plan assault on Mideast states Cc: [EMAIL PROTECTED]